CVE-2026-27025: CWE-834: Excessive Iteration in py-pdf pypdf
CVE-2026-27025 is a medium severity vulnerability in the pypdf library versions prior to 6. 7. 1. It involves excessive iteration when parsing the /ToUnicode entry of fonts in crafted PDF files, leading to long runtimes and high memory consumption. This can cause denial of service conditions during text extraction without requiring user interaction or privileges. The vulnerability is fixed in version 6. 7. 1. Exploitation requires an attacker to supply a malicious PDF to a system using a vulnerable pypdf version. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
The vulnerability CVE-2026-27025 affects pypdf, a widely used open-source pure-Python library for PDF processing. The issue arises from excessive iteration (CWE-834) when parsing the /ToUnicode entry of font objects within a PDF. An attacker can craft a PDF file with unusually large or complex /ToUnicode mappings, which causes the pypdf library to consume excessive CPU time and memory during text extraction operations. This leads to performance degradation and potential denial of service (DoS) on systems processing such PDFs. The flaw does not require any authentication, user interaction, or elevated privileges to exploit, but the attacker must supply the malicious PDF to the target environment. The vulnerability was addressed and fixed in pypdf version 6.7.1. The CVSS v4.0 base score is 6.9 (medium severity), reflecting local attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability. No known exploits have been reported in the wild as of now.
Potential Impact
Organizations using pypdf versions prior to 6.7.1 are at risk of denial of service attacks if they process untrusted or malicious PDF files. This can affect applications performing automated PDF text extraction, indexing, or analysis, potentially causing service outages or degraded performance due to resource exhaustion. The impact is primarily on availability, with no direct confidentiality or integrity compromise reported. Systems that automatically ingest PDFs from external sources, such as document management systems, email gateways, or web applications, are particularly vulnerable. The resource exhaustion could lead to crashes or slowdowns, affecting business continuity and user experience. While no exploits are known in the wild, the ease of crafting malicious PDFs and the lack of required privileges make this a credible threat, especially in environments processing large volumes of PDFs.
Mitigation Recommendations
The primary mitigation is to upgrade all pypdf library instances to version 6.7.1 or later, where the vulnerability is fixed. Organizations should audit their software dependencies to identify and update vulnerable versions. Additionally, implement strict input validation and sandboxing for PDF processing workflows to isolate potential resource exhaustion. Rate-limit or quarantine PDF files from untrusted or external sources before processing. Employ monitoring to detect unusual CPU or memory usage spikes during PDF handling. Where possible, use alternative PDF processing libraries with robust parsing and resource controls. Finally, maintain an inventory of applications and services using pypdf to ensure timely patching and reduce attack surface.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, South Korea, India, Brazil
CVE-2026-27025: CWE-834: Excessive Iteration in py-pdf pypdf
Description
CVE-2026-27025 is a medium severity vulnerability in the pypdf library versions prior to 6. 7. 1. It involves excessive iteration when parsing the /ToUnicode entry of fonts in crafted PDF files, leading to long runtimes and high memory consumption. This can cause denial of service conditions during text extraction without requiring user interaction or privileges. The vulnerability is fixed in version 6. 7. 1. Exploitation requires an attacker to supply a malicious PDF to a system using a vulnerable pypdf version. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-27025 affects pypdf, a widely used open-source pure-Python library for PDF processing. The issue arises from excessive iteration (CWE-834) when parsing the /ToUnicode entry of font objects within a PDF. An attacker can craft a PDF file with unusually large or complex /ToUnicode mappings, which causes the pypdf library to consume excessive CPU time and memory during text extraction operations. This leads to performance degradation and potential denial of service (DoS) on systems processing such PDFs. The flaw does not require any authentication, user interaction, or elevated privileges to exploit, but the attacker must supply the malicious PDF to the target environment. The vulnerability was addressed and fixed in pypdf version 6.7.1. The CVSS v4.0 base score is 6.9 (medium severity), reflecting local attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability. No known exploits have been reported in the wild as of now.
Potential Impact
Organizations using pypdf versions prior to 6.7.1 are at risk of denial of service attacks if they process untrusted or malicious PDF files. This can affect applications performing automated PDF text extraction, indexing, or analysis, potentially causing service outages or degraded performance due to resource exhaustion. The impact is primarily on availability, with no direct confidentiality or integrity compromise reported. Systems that automatically ingest PDFs from external sources, such as document management systems, email gateways, or web applications, are particularly vulnerable. The resource exhaustion could lead to crashes or slowdowns, affecting business continuity and user experience. While no exploits are known in the wild, the ease of crafting malicious PDFs and the lack of required privileges make this a credible threat, especially in environments processing large volumes of PDFs.
Mitigation Recommendations
The primary mitigation is to upgrade all pypdf library instances to version 6.7.1 or later, where the vulnerability is fixed. Organizations should audit their software dependencies to identify and update vulnerable versions. Additionally, implement strict input validation and sandboxing for PDF processing workflows to isolate potential resource exhaustion. Rate-limit or quarantine PDF files from untrusted or external sources before processing. Employ monitoring to detect unusual CPU or memory usage spikes during PDF handling. Where possible, use alternative PDF processing libraries with robust parsing and resource controls. Finally, maintain an inventory of applications and services using pypdf to ensure timely patching and reduce attack surface.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-17T03:08:23.490Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6998e47bbe58cf853bd9f767
Added to database: 2/20/2026, 10:47:23 PM
Last enriched: 2/20/2026, 11:01:54 PM
Last updated: 2/20/2026, 11:49:34 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.